For hackers, the stolen data would be useless, but authorized users would have a secret key that filters out the fake ...